Vulnerability Description
SAS Web Infrastructure Platform before 9.4M6 allows remote attackers to execute arbitrary code via a Java deserialization variant.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sas | Web Infrastructure Platform | < 9.4 |
| Hpe | Hp-Ux Ipfilter | - |
| Ibm | Aix | - |
| Linux | Linux Kernel | - |
| Microsoft | Windows | - |
| Oracle | Solaris | - |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/106648Third Party AdvisoryVDB Entry
- https://support.sas.com/kb/63/391.htmlVendor Advisory
- http://www.securityfocus.com/bid/106648Third Party AdvisoryVDB Entry
- https://support.sas.com/kb/63/391.htmlVendor Advisory
FAQ
What is CVE-2018-20732?
CVE-2018-20732 is a vulnerability with a CVSS score of 9.8 (CRITICAL). SAS Web Infrastructure Platform before 9.4M6 allows remote attackers to execute arbitrary code via a Java deserialization variant.
How severe is CVE-2018-20732?
CVE-2018-20732 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-20732?
Check the references section above for vendor advisories and patch information. Affected products include: Sas Web Infrastructure Platform, Hpe Hp-Ux Ipfilter, Ibm Aix, Linux Linux Kernel, Microsoft Windows.